skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Search for: All records

Creators/Authors contains: "Heimerl, Kurtis"

Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

  1. We present dAuth, an approach to device authentication in private cellular networks which refactors the responsibilities of authentication to enable multiple small private cellular networks to federate together to provide a more reliable and resilient service than could be achieved on their own. dAuth is designed to be backwards compatible with off-the-shelf 4G and 5G cellular devices and can be incrementally deployed today. It uses cryptographic secret sharing and a division of concerns between sensitive data stored with backup networks and non-sensitive public directory data to securely scale authentication across multiple redundant nodes operating among different and untrusted organizations. Specifically, it allows a collection of pre-configured backup networks to authenticate users on behalf of their home network while the home network is unavailable. We evaluate dAuth’s performance with production equipment from an active federated community network, finding that it is able to work with existing systems. We follow this with an evaluation using a simulated 5G RAN and find that it performs comparably to a standalone cloud-based 5G core at low load, and outperforms a centralized core at high load due to its innate load-sharing properties. 
    more » « less
  2. This paper presents a mixed-methods study of app-based motorcycle taxis in Thailand to explore the social dynamics of rideshare drivers and their exercised autonomy both through social pressure and a hostile work environment. As motorcycle taxis are open-air vehicles, drivers can be exposed to prolonged air pollution and other weather events, potentially impacting their health. In an initial quantitative study of server-side rideshare logs, we unexpectedly found that drivers do not exercise the autonomy provided by their rideshare platform to avoid air pollution events. This prompted a follow-on investigation through semi-structured interviews of both drivers and passengers in three provinces to explore why these drivers fail to experience the autonomy promised by gig-work in this context and elucidated further examples this lack of autonomy experienced by drivers. Our study sheds light on the social context that may constrain a driver's agency, including financial pressures, weather conditions, conflicts with local taxi organizations, and a false perception that drivers need to work around the ride assignment algorithm to avoid being blacklisted. We find that when leveraging app-based rideshare opportunities, drivers simultaneously perceive increased flexibility in their work hours and a lack of agency to prioritize their health and safety. We conclude with a discussion on potential interventions aimed at mitigating the forces preventing drivers from exercising their autonomy. 
    more » « less
  3. As computer science has grown in importance throughout the world, there’s been a similarly growing drive to apply foundational computer science to address core societal issues. For networking researchers, this effort has largely focused on bringing the benefits of Internet access to marginalized populations. In this work, we reflect on more than a decade of our own work deploying such research into the world in all of rural, urban, developed, and developing regions. We share key lessons and related stories that have influenced they way we do this type of work. We conclude with a call to other researchers to add their own stories to share back to the wider networking research community. 
    more » « less